Deck 6: Creating, sorting, and Querying a Table
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 6: Creating, sorting, and Querying a Table
1
To prevent a laptop from being stolen,you can use a timelock device.
False
2
Technology can lead to all of the following behavioral risks EXCEPT _____.
A) social withdrawal
B) depression and anxiety
C) a sedentary lifestyle
D) higher satisfaction with life
A) social withdrawal
B) depression and anxiety
C) a sedentary lifestyle
D) higher satisfaction with life
D
3
Isabel received a message on her computer that appeared to be from the FBI.It informed her that her computer has been locked and she would need to pay a fee to retrieve her data.How would you describe what is happening?
A) A hacker is trying to put a Trojan on her computer.
B) A worm has infected her computer and she needs to unplug her device.
C) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
D) Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.
A) A hacker is trying to put a Trojan on her computer.
B) A worm has infected her computer and she needs to unplug her device.
C) It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
D) Nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now.
C
4
A Trojan is a malicious program that uses a computer network to replicate.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements.
D) Throwing financial documents older than three months in the trash.
A) Being cautious about what information you post on social networking sites.
B) Requesting a credit report and freezing your credit.
C) Querying unfamiliar purchases found on your bank statements.
D) Throwing financial documents older than three months in the trash.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
After Penny broke up with her boyfriend,he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating.He even lied about their breakup,creating rumors about her behavior.Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated.Penny is a victim of ________.
A) cyberstalking
B) cyberbullying
C) social engineering
D) data mining
A) cyberstalking
B) cyberbullying
C) social engineering
D) data mining
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
To protect your information and help you to remember passwords,use your social media account login information to log into another site.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Choose the strongest password.
A) Test1test2test3
B) colorbluesky
C) Welcome123
D) H@veAGr3atDaY!
A) Test1test2test3
B) colorbluesky
C) Welcome123
D) H@veAGr3atDaY!
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
A) creating a strong password to access the router
B) naming your router something you'll remember,like your street address
C) turning off remote management to the device
D) utilizing guest access when needed and turning it off when guests leave
A) creating a strong password to access the router
B) naming your router something you'll remember,like your street address
C) turning off remote management to the device
D) utilizing guest access when needed and turning it off when guests leave
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
Marcus recently had his cell phone stolen.All of the following are security features that should help him locate his stolen phone EXCEPT which one?
A) His phone can generate an alarm even if it is on mute.
B) He can use remote wiping to retrace the thief's steps.
C) The current location of his phone can be pinpointed on a map through the phone's GPS.
D) If the thief enters an incorrect passcode thee times,then a picture of the thief will be taken and emailed to Marcus.
A) His phone can generate an alarm even if it is on mute.
B) He can use remote wiping to retrace the thief's steps.
C) The current location of his phone can be pinpointed on a map through the phone's GPS.
D) If the thief enters an incorrect passcode thee times,then a picture of the thief will be taken and emailed to Marcus.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
How can you protect a computer from electrical spikes and surges?
A) Use a surge protector.
B) Unplug the computer when it is not in use.
C) Use an uninterruptible power supply.
D) Use a cable lock.
A) Use a surge protector.
B) Unplug the computer when it is not in use.
C) Use an uninterruptible power supply.
D) Use a cable lock.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
How can you protect your information when using social media?
A) Make sure you have your credit or debit card linked to your social media account.
B) Use the same password and username for your social media that you use for your online banking account.
C) Have your security information marked public on your social media account.
D) Accept friend requests from people you want to be friends with.
A) Make sure you have your credit or debit card linked to your social media account.
B) Use the same password and username for your social media that you use for your online banking account.
C) Have your security information marked public on your social media account.
D) Accept friend requests from people you want to be friends with.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
There are various risks from attacks on Wi-Fi networks.These include all of the following EXCEPT _____.
A) reading wireless transmissions
B) viewing or stealing computer data
C) downloading harmful content
D) creating malware
A) reading wireless transmissions
B) viewing or stealing computer data
C) downloading harmful content
D) creating malware
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
A) Cyberbullying
B) Ergonomics
C) Technology addiction
D) Repetitive strain
A) Cyberbullying
B) Ergonomics
C) Technology addiction
D) Repetitive strain
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
Emma downloaded a new game from an unfamiliar website.A few days later,Emma realized her system had been hacked and her credit card numbers were stolen.Without Emma knowing,what type of malware might she have downloaded to her computer?
A) A worm
B) A Trojan
C) Spam
D) Ransomware
A) A worm
B) A Trojan
C) Spam
D) Ransomware
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
In terms of privacy,which of the following is a best practice?
A) Saving your personal information as an email draft
B) Keeping your Social Security number hidden in a locked box in your home
C) Posting your location on social media
D) Throwing away old bank statements that are more than three months old
A) Saving your personal information as an email draft
B) Keeping your Social Security number hidden in a locked box in your home
C) Posting your location on social media
D) Throwing away old bank statements that are more than three months old
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
How is the environment impacted by computers being thrown away in landfills?
A) Data miners are digging up landfills looking for gold and platinum.
B) The lead and mercury is seeping into the ground and water supply.
C) The copper is creating fire dangers and explosive possibilities.
D) The e-waste is increasing because more people are choosing to recycle.
A) Data miners are digging up landfills looking for gold and platinum.
B) The lead and mercury is seeping into the ground and water supply.
C) The copper is creating fire dangers and explosive possibilities.
D) The e-waste is increasing because more people are choosing to recycle.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
How does encryption work?
A) It scrambles the information until the key is used to unscramble it.
B) It protects data on your hard drive,but once you choose to send it to someone,it is no longer protected.
C) It is a key that you insert into your computer to unlock your saved files.
D) It is what happens when you download attachments from your email.
A) It scrambles the information until the key is used to unscramble it.
B) It protects data on your hard drive,but once you choose to send it to someone,it is no longer protected.
C) It is a key that you insert into your computer to unlock your saved files.
D) It is what happens when you download attachments from your email.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
What is a digital certificate?
A) The key to unlock information into a readable format
B) Technology used to verify a user's identity
C) The process of scrambling information so that it cannot be read
D) A growing trend used to combine multiple types of authentication
A) The key to unlock information into a readable format
B) Technology used to verify a user's identity
C) The process of scrambling information so that it cannot be read
D) A growing trend used to combine multiple types of authentication
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is a characteristic of a strong password?
A) A short phrase
B) numbers in a series
C) letters,numbers,and symbols
D) personal information
A) A short phrase
B) numbers in a series
C) letters,numbers,and symbols
D) personal information
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
How can an attacker execute malware through a script?
A) An attacker can steal a cookie and impersonate you in a script,thereby infecting someone else's computer.
B) An attacker can attach to a plug-in and when you allow the plug-in to run,it infects the website you were visiting.
C) An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan.
D) An attacker can attach a script to a program that you download which then infects your computer.
A) An attacker can steal a cookie and impersonate you in a script,thereby infecting someone else's computer.
B) An attacker can attach to a plug-in and when you allow the plug-in to run,it infects the website you were visiting.
C) An attacker can impersonate a pop-up and when you click on it create a script to spread a Trojan.
D) An attacker can attach a script to a program that you download which then infects your computer.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
How will you decide which browser security settings to allow and which ones to block?
A) If the browser security setting is from my favorite online retailers,I will accept it because the retailer knows what I like.
B) I will need to review each browser security setting and use my best judgement.
C) If the browser security setting is on a website sent from a friend,I always accept the setting.
D) If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one,so I should do change it on my computer too.
A) If the browser security setting is from my favorite online retailers,I will accept it because the retailer knows what I like.
B) I will need to review each browser security setting and use my best judgement.
C) If the browser security setting is on a website sent from a friend,I always accept the setting.
D) If the browser security setting has been mentioned on several friends' timelines on Facebook then it must be a good one,so I should do change it on my computer too.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
What would a password manager allow you to do?
A) Test your memorization skills.
B) Create and store multiple strong passwords.
C) Make sure you do not repeat passwords on similar accounts.
D) Prevent you from using birthdays in your passwords.
A) Test your memorization skills.
B) Create and store multiple strong passwords.
C) Make sure you do not repeat passwords on similar accounts.
D) Prevent you from using birthdays in your passwords.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
How could an online attacker use your online profile to gather information about you to steal your identity?
A) Use your profile pictures to figure out where you are.
B) Pose as a long lost relative to become one of your friends.
C) Use your posts to figure out answers to possible security questions.
D) Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.
A) Use your profile pictures to figure out where you are.
B) Pose as a long lost relative to become one of your friends.
C) Use your posts to figure out answers to possible security questions.
D) Post a message that appears to be from a friend warning about a security breach and encouraging you to change your account information.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
How is a worm different from a Trojan?
A) A worm reproduces itself on the same computer,whereas a Trojan attempts to spread through the network.
B) A worm gathers information and transmits to a server,whereas a Trojan hides and then spreads through a network.
C) A worm spreads through a network,whereas a Trojan hides inside another program.
D) A worm prevents a device from functioning until a ransom is paid,whereas a Trojan gathers information and transmits it to another device.
A) A worm reproduces itself on the same computer,whereas a Trojan attempts to spread through the network.
B) A worm gathers information and transmits to a server,whereas a Trojan hides and then spreads through a network.
C) A worm spreads through a network,whereas a Trojan hides inside another program.
D) A worm prevents a device from functioning until a ransom is paid,whereas a Trojan gathers information and transmits it to another device.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
Which is a first step to deter thieves from accessing your financial information?
A) Do not provide personal information over the phone or through email.
B) Review financial and billing statements each month carefully.
C) Follow up on calls regarding purchases that were not made.
D) Be alert to signs that may indicate unusual activity in an account.
A) Do not provide personal information over the phone or through email.
B) Review financial and billing statements each month carefully.
C) Follow up on calls regarding purchases that were not made.
D) Be alert to signs that may indicate unusual activity in an account.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
In which of the following real-life situations would it be useful to use a digital certificate?
A) if you were submitting a paper to your professor
B) if you were registering for an event
C) if you were emailing a friend
D) if you were signing a rental lease
A) if you were submitting a paper to your professor
B) if you were registering for an event
C) if you were emailing a friend
D) if you were signing a rental lease
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
With more and more people using technology,what physical health diagnosis is on the rise?
A) cyberstalking
B) cyberbullying
C) repetitive strain injury
D) technology addiction
A) cyberstalking
B) cyberbullying
C) repetitive strain injury
D) technology addiction
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
A) encryption
B) dumpster diving
C) phishing
D) identity theft
A) encryption
B) dumpster diving
C) phishing
D) identity theft
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
You are watching the news and learn that there has been a security breach of credit card information at a large department store.The news report also states that the same company has had recent layoffs.The report says that the company is looking into whether or not the breach was done by an insider.Why would the company investigate the possibility of the breach being from an insider?
A) Because insiders like to cause disruption and panic among citizens.
B) Because insiders create threats after incidents at their places of employment.
C) Because insiders change contents to make a political statement.
D) Because insiders lack the knowledge of computers and networks to perform this task.
A) Because insiders like to cause disruption and panic among citizens.
B) Because insiders create threats after incidents at their places of employment.
C) Because insiders change contents to make a political statement.
D) Because insiders lack the knowledge of computers and networks to perform this task.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck